US12355714B2 - System and method for self-destructing messages - Google Patents
System and method for self-destructing messages Download PDFInfo
- Publication number
- US12355714B2 US12355714B2 US18/456,257 US202318456257A US12355714B2 US 12355714 B2 US12355714 B2 US 12355714B2 US 202318456257 A US202318456257 A US 202318456257A US 12355714 B2 US12355714 B2 US 12355714B2
- Authority
- US
- United States
- Prior art keywords
- message
- user
- ttl
- inbox
- link
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/07—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail characterised by the inclusion of specific contents
- H04L51/18—Commands or executable codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/234—Monitoring or handling of messages for tracking messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/42—Mailbox-related aspects, e.g. synchronisation of mailboxes
Definitions
- the present disclosure relates generally to email management, and more specifically, towards systems and methods for automatic self-destruction of communicated messages.
- Electronic mail (“email”) usage has become ubiquitous for online users as larger numbers of people are able to access the Internet from an array of devices.
- electronic mail also provides an effective form of communication for individuals, businesses, organizations, and other entities interested in communicating with large groups of people, such as friends, family, co-workers, customers, and the like.
- electronic communications such as electronic mail, provide a powerful means of communicating content to a targeted audience.
- the present disclosure describes systems and methods for automatically deleting messages from a recipient's inbox.
- the disclosed systems and methods provide the ability for automatic actions to be taken on delivered messages based on a passage of time. This enables a sender of messages, an email service provider and/or email platform to exert control over sent messages thereby limiting the number and type of operations that may be performed on such messages. For example, operations such as saving, forwarding, printing, copying, or otherwise duplicating the message and/or message data can be prohibited and all together rendered impossible.
- the disclosed systems and methods enable the purging of messages and associated message data from a recipient's inbox at a certain specified time, after the passage of a pre-determined amount of time, or upon the detection of a specified event.
- the disclosed systems and methods can be implemented as an extension to existing messaging applications, programs and/or services. This ensures that messaging clients and servers that handle such messages, as discussed herein, conform to the protocol specific to each message.
- Such protocol which can be applied to any known or to be known message platform does not require a user(s) (e.g., message sender and/or recipient) to sign-up to a new mail provider/service.
- the disclosed systems and methods provide additional control of delivered messages not previously present in existing message applications through a protocol-enhancement that enables message data to self-destruct from within a recipient's inbox after a message is delivered.
- the messaging protocol discussed herein provides functionality for messages to self-erase (from the client and server) after stipulated operational criteria, such as a date range, specified time or action taken or requested to be taken.
- a method which includes receiving, at a computing device over a network from a first user, a message addressed to an inbox associated with a second user, the message comprising message content and a time-to-live (TTL) restriction embedded within metadata of the message, the TTL restriction comprising a TTL trigger indicating the message is being sent via short-lived (SL) protocol that enables the message to self-destruct in accordance with the TTL restriction; determining, via the computing device, that the second user's message account hosting the inbox of the second user supports SL protocol; delivering, over the network, the message to the inbox of the second user; parsing, via the computing device, the message to determine when the TTL restriction is satisfied, the parsing comprising parsing the metadata to identify the TTL trigger; monitoring, via the computing device, an environment to detect an event satisfying the trigger; and causing, in response to the trigger detection, the deletion, via the computing device, of the message from the second user inbox when the TTL
- TTL time-to-live
- a method which includes determining, via the computing device, that the second user message account does not support SL protocol; storing, via the computing device, the message in data storage on the network; creating, via the computing device, a link message, the link message comprising a link to the stored message, the link message being compliant with the TTL restriction; and delivering, over the network, the link message to the second user inbox.
- the method further includes parsing, via the computing device, the link message to determine when the TTL restriction is satisfied, the parsing comprising parsing metadata of the link message to identify the trigger; monitoring, via the computing device, the environment to detect a second event satisfying the trigger; and causing, in response to the second trigger detection, deletion, via the computing device, of the stored message when the TTL restriction expires.
- the method further includes causing, in response to the second trigger detection, deletion, via the computing device, of the link message from the inbox of the second user when the TTL restriction expires.
- a non-transitory computer-readable storage medium tangibly storing thereon, or having tangibly encoded thereon, computer readable instructions that when executed cause at least one processor to perform a method for automatic self-destruction of communicated messages.
- a system comprising one or more computing devices configured to provide functionality in accordance with such embodiments.
- functionality is embodied in steps of a method performed by at least one computing device.
- program code to implement functionality in accordance with one or more such embodiments is embodied in, by and/or on a non-transitory computer-readable medium.
- FIG. 1 is a schematic diagram illustrating an example of a network within which the systems and methods disclosed herein could be implemented according to some embodiments of the present disclosure
- FIG. 3 is a schematic block diagram illustrating components of a system in accordance with embodiments of the present disclosure
- FIG. 4 is a flowchart illustrating steps performed in accordance with some embodiments of the present disclosure.
- FIG. 5 is a flowchart illustrating steps performed in accordance with some embodiments of the present disclosure.
- FIG. 6 is a block diagram illustrating architecture of a hardware device in accordance with one or more embodiments of the present disclosure.
- terms, such as “a,” “an,” or “the,” again, may be understood to convey a singular usage or to convey a plural usage, depending at least in part upon context.
- the term “based on” may be understood as not necessarily intended to convey an exclusive set of factors and may, instead, allow for existence of additional factors not necessarily expressly described, again, depending at least in part on context.
- These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, ASIC, or other programmable data processing apparatus, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, implement the functions/acts specified in the block diagrams or operational block or blocks.
- a computer readable medium stores computer data, which data can include computer program code (or computer-executable instructions) that is executable by a computer, in machine readable form.
- a computer readable medium may comprise computer readable storage media, for tangible or fixed storage of data, or communication media for transient interpretation of code-containing signals.
- Computer readable storage media refers to physical or tangible storage (as opposed to signals) and includes without limitation volatile and non-volatile, removable and non-removable media implemented in any method or technology for the tangible storage of information such as computer-readable instructions, data structures, program modules or other data.
- Computer readable storage media includes, but is not limited to, RAM, ROM, EPROM, EEPROM, flash memory or other solid state memory technology, CD-ROM, DVD, or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other physical or material medium which can be used to tangibly store the desired information or data or instructions and which can be accessed by a computer or processor.
- server should be understood to refer to a service point which provides processing, database, and communication facilities.
- server can refer to a single, physical processor with associated communications and data storage and database facilities, or it can refer to a networked or clustered complex of processors and associated network and storage devices, as well as operating software and one or more database systems and application software that support the services provided by the server.
- Servers may vary widely in configuration or capabilities, but generally a server may include one or more central processing units and memory.
- a server may also include one or more mass storage devices, one or more power supplies, one or more wired or wireless network interfaces, one or more input/output interfaces, or one or more operating systems, such as Windows Server, Mac OS X, Unix, Linux, FreeBSD, or the like.
- a “network” should be understood to refer to a network that may couple devices so that communications may be exchanged, such as between a server and a client device or other types of devices, including between wireless devices coupled via a wireless network, for example.
- a network may also include mass storage, such as network attached storage (NAS), a storage area network (SAN), or other forms of computer or machine readable media, for example.
- a network may include the Internet, one or more local area networks (LANs), one or more wide area networks (WANs), wire-line type connections, wireless type connections, cellular or any combination thereof.
- sub-networks which may employ differing architectures or may be compliant or compatible with differing protocols, may interoperate within a larger network.
- Various types of devices may, for example, be made available to provide an interoperable capability for differing architectures or protocols.
- a router may provide a link between otherwise separate and independent LANs.
- a communication link or channel may include, for example, analog telephone lines, such as a twisted wire pair, a coaxial cable, full or fractional digital lines including T1, T2, T3, or T4 type lines, Integrated Services Digital Networks (ISDNs), Digital Subscriber Lines (DSLs), wireless links including satellite links, or other communication links or channels, such as may be known to those skilled in the art.
- ISDNs Integrated Services Digital Networks
- DSLs Digital Subscriber Lines
- wireless links including satellite links, or other communication links or channels, such as may be known to those skilled in the art.
- a computing device or other related electronic devices may be remotely coupled to a network, such as via a telephone line or link, for example.
- a wireless network should be understood to couple client devices with a network.
- a wireless network may employ stand-alone ad-hoc networks, mesh networks, Wireless LAN (WLAN) networks, cellular networks, or the like.
- a wireless network may further include a system of terminals, gateways, routers, or the like coupled by wireless radio links, or the like, which may move freely, randomly or organize themselves arbitrarily, such that network topology may change, at times even rapidly.
- a wireless network may further employ a plurality of network access technologies, including Long Term Evolution (LTE), WLAN, Wireless Router (WR) mesh, or 2nd, 3rd, or 4th generation (2G, 3G, or 4G) cellular technology, or the like.
- Network access technologies may enable wide area coverage for devices, such as client devices with varying degrees of mobility, for example.
- a network may enable RF or wireless type communication via one or more network access technologies, such as Global System for Mobile communication (GSM), Universal Mobile Telecommunications System (UMTS), General Packet Radio Services (GPRS), Enhanced Data GSM Environment (EDGE), 3GPP Long Term Evolution (LTE), LTE Advanced, Wideband Code Division Multiple Access (WCDMA), Bluetooth, 802.11b/g/n, or the like.
- GSM Global System for Mobile communication
- UMTS Universal Mobile Telecommunications System
- GPRS General Packet Radio Services
- EDGE Enhanced Data GSM Environment
- LTE Long Term Evolution
- LTE Advanced Long Term Evolution
- WCDMA Wideband Code Division Multiple Access
- Bluetooth 802.11b/g/n, or the like.
- 802.11b/g/n 802.11b/g/n, or the like.
- a wireless network may include virtually any type of wireless communication mechanism by which signals may be communicated between devices, such as a client device or a computing device, between or within a network, or
- a computing device may be capable of sending or receiving signals, such as via a wired or wireless network, or may be capable of processing or storing signals, such as in memory as physical memory states, and may, therefore, operate as a server.
- devices capable of operating as a server may include, as examples, dedicated rack-mounted servers, desktop computers, laptop computers, set top boxes, integrated devices combining various features, such as two or more features of the foregoing devices, or the like.
- Servers may vary widely in configuration or capabilities, but generally a server may include one or more central processing units and memory.
- a server may also include one or more mass storage devices, one or more power supplies, one or more wired or wireless network interfaces, one or more input/output interfaces, or one or more operating systems, such as Windows Server, Mac OS X, Unix, Linux, FreeBSD, or the like.
- a client (or consumer or user) device may include a computing device capable of sending or receiving signals, such as via a wired or a wireless network.
- a client device may, for example, include a desktop computer or a portable device, such as a cellular telephone, a smart phone, a display pager, a radio frequency (RF) device, an infrared (IR) device an Near Field Communication (NFC) device, a Personal Digital Assistant (PDA), a handheld computer, a tablet computer, a laptop computer, a set top box, a wearable computer, an integrated device combining various features, such as features of the forgoing devices, or the like.
- RF radio frequency
- IR infrared
- NFC Near Field Communication
- PDA Personal Digital Assistant
- a client device may vary in terms of capabilities or features. Claimed subject matter is intended to cover a wide range of potential variations.
- a cell phone may include a numeric keypad or a display of limited functionality, such as a monochrome liquid crystal display (LCD) for displaying text.
- a web-enabled client device may include one or more physical or virtual keyboards, mass storage, one or more accelerometers, one or more gyroscopes, global positioning system (GPS) or other location-identifying type capability, or a display with a high degree of functionality, such as a touch-sensitive color 2D or 3D display, for example.
- GPS global positioning system
- a client device may include or may execute a variety of operating systems, including a personal computer operating system, such as a Windows, iOS or Linux, or a mobile operating system, such as iOS, Android, or Windows Mobile, or the like.
- a client device may include or may execute a variety of possible applications, such as a client software application enabling communication with other devices, such as communicating one or more messages, such as via email, short message service (SMS), or multimedia message service (MMS), including via a network, such as a social network, including, for example, Facebook®, LinkedIn®, Twitter®, Flickr®, or Google+®, InstagramTM, to provide only a few possible examples.
- a client device may also include or execute an application to communicate content, such as, for example, textual content, multimedia content, or the like.
- a client device may also include or execute an application to perform a variety of possible tasks, such as browsing, searching, playing various forms of content, including locally stored or streamed video, or games (such as fantasy sports leagues).
- an application to perform a variety of possible tasks, such as browsing, searching, playing various forms of content, including locally stored or streamed video, or games (such as fantasy sports leagues).
- the disclosed systems and methods can be implemented through an installed extension associated with any known or to be known messaging application, program and/or service.
- the extension can be associated with a server handling the communication of messages, and in some embodiments, the extension can be associated with an application program being utilized for viewing delivered messages.
- the disclosed systems and methods can be an extension to core Simple Mail Transfer Protocol (SMTP), which eliminates a dependency on external software or applications.
- SMTP Simple Mail Transfer Protocol
- the disclosed systems and methods provide additional control of delivered messages not previously present in existing message applications through a protocol or application level enhancement that provides for self-destruction of message data from a recipient's inbox after a message is delivered.
- the messaging protocol discussed herein provides functionality for messages to self-erase (from the client and server) after stipulated operational criteria, such as a date range, specified time or action taken or requested to be taken, as discussed in more detail below.
- the present disclosure provides systems and methods for self-destructing messages that allow a user (or email provider or administrator) to specify time criteria for the destruction of sent (and delivered) messages, whereby upon satisfaction of such time criteria, all instances of the delivered message will be destroyed. That is, in some embodiments, after a time criteria has been satisfied, all versions of a delivered message will be destroyed. Such versions can include copies of the message in a recipient's inbox, on a recipient's device and/or on a server hosting the messaging platform (and database associated with such platform). In some embodiments, the message copy in the sender's sent folder can also be deleted. According to some embodiments, the disclosed systems and methods can restrict the number and type of operations that may be subsequently performed on sent messages, thereby restricting the ability of a recipient to replicate the message.
- the header or portion of the message containing the TTL flag may be encrypted to avoid the possibility of changing or corrupting the message's control. That is, for security of the information contained within sent messages, message may be secured by using a known or to be known negotiated encryption key or a pre-defined encryption key. Such encryption may occur at the sending device, receiving device and/or communicating server(s), or some combination thereof.
- Client devices 101 - 102 computing device may be capable of sending or receiving signals, such as via a wired or wireless network, or may be capable of processing or storing signals, such as in memory as physical memory states, and may, therefore, operate as a server.
- devices capable of operating as a server may include, as examples, dedicated rack-mounted servers, desktop computers, laptop computers, set top boxes, integrated devices combining various features, such as two or more features of the foregoing devices, or the like.
- Content server 106 can further provide a variety of services that include, but are not limited to, email services, photo services, web services, third-party services, audio services, video services, instant messaging (IM) services, SMS services, MMS services, FTP services, voice over IP (VOIP) services, or the like.
- services for example the email services and email platform, can be provided via the messaging server 120 .
- Examples of content may include images, text, audio, video, or the like, which may be processed in the form of physical signals, such as electrical signals, for example, or may be stored in memory, as physical states, for example.
- An ad server 130 comprises a server that stores online advertisements for presentation to users.
- Ad serving refers to methods used to place online advertisements on websites, in applications, or other places where users are more likely to see them, such as during an online session or during computing platform use, for example.
- Various monetization techniques or models may be used in connection with sponsored advertising, including advertising associated with user.
- Such sponsored advertising includes monetization techniques including sponsored search advertising, non-sponsored search advertising, guaranteed and non-guaranteed delivery advertising, ad networks/exchanges, ad targeting, ad serving and ad analytics.
- a process of buying or selling online advertisements may involve a number of different entities, including advertisers, publishers, agencies, networks, or developers.
- organization systems called “ad exchanges” may associate advertisers or publishers, such as via a platform to facilitate buying or selling of online advertisement inventory from multiple ad networks.
- Ad networks refers to aggregation of ad space supply from publishers, such as for provision en masse to advertisers.
- advertisements may be displayed on web pages resulting from a user-defined search based at least in part upon one or more search terms. Advertising may be beneficial to users, advertisers or web portals if displayed advertisements are relevant to interests of one or more users.
- One approach to presenting targeted advertisements includes employing demographic characteristics (e.g., age, income, sex, occupation, etc.) for predicting user behavior, such as by group. Advertisements may be presented to users in a targeted audience based at least in part upon predicted user behavior(s).
- demographic characteristics e.g., age, income, sex, occupation, etc.
- Another approach includes profile-type ad targeting.
- user profiles specific to a user may be generated to model user behavior, for example, by tracking a user's path through a web site or network of sites, and compiling a profile based at least in part on pages or advertisements ultimately delivered.
- a correlation may be identified, such as for user purchases, for example. An identified correlation may be used to target potential purchasers by targeting content or advertisements to particular users.
- a presentation system may collect descriptive content about types of advertisements presented to users. A broad range of descriptive content may be gathered, including content specific to an advertising presentation system. Advertising analytics gathered may be transmitted to locations remote to an advertising presentation system for storage or for further evaluation. Where advertising analytics transmittal is not immediately available, gathered advertising analytics may be stored by an advertising presentation system until transmittal of those advertising analytics becomes available.
- users are able to access services provided by servers 106 , 108 , 120 and/or 130 .
- This may include in a non-limiting example, email servers, social networking services servers, SMS servers, IM servers, MMS servers, exchange servers, photo-sharing services servers, and travel services servers, via the network 105 using their various devices 101 - 102 .
- applications such as a messaging application (e.g., Yahoo! Messenger®, Yahoo! Mail®, and the like), can be hosted by the application server 108 .
- the application server 108 can store various types of applications and application related information including application data and user profile information.
- messaging server 120 can host email applications; therefore, the messaging server 120 can store various types of applications and application related information including email application data and user profile information.
- content server 106 can also store various types of data related to the content and services provided by content server 106 in an associated content database 107 , as discussed in more detail below.
- TSS Trusted Search Server
- FIG. 1 illustrates servers 106 , 108 , 120 and 130 as single computing devices, respectively, the disclosure is not so limited. For example, one or more functions of servers 106 , 108 , 120 and/or 130 may be distributed across one or more distinct computing devices. Moreover, in one embodiment, servers 106 , 108 , 120 and/or 130 may be integrated into a single computing device, without departing from the scope of the present disclosure.
- Client device 200 may optionally communicate with a base station (not shown), or directly with another computing device.
- Network interface 250 includes circuitry for coupling Client device 200 to one or more networks, and is constructed for use with one or more communication protocols and technologies including, but not limited to, global system for Client communication (GSM), code division multiple access (CDMA), time division multiple access (TDMA), user datagram protocol (UDP), transmission control protocol/Internet protocol (TCP/IP), SMS, general packet radio service (GPRS), WAP, ultra wide band (UWB), IEEE 802.16 Worldwide Interoperability for Microwave Access (WiMax), SIP/RTP, or any of a variety of other wireless communication protocols.
- GSM global system for Client communication
- CDMA code division multiple access
- TDMA time division multiple access
- UDP user datagram protocol
- TCP/IP transmission control protocol/Internet protocol
- SMS general packet radio service
- GPRS general packet radio service
- WAP ultra wide band
- UWB ultra wide band
- IEEE 802.16 Worldwide Interoperability for
- Audio interface 252 is arranged to produce and receive audio signals such as the sound of a human voice.
- audio interface 252 may be coupled to a speaker and microphone (not shown) to enable telecommunication with others and/or generate an audio acknowledgement for some action.
- Display 254 may be a liquid crystal display (LCD), gas plasma, light emitting diode (LED), or any other type of display used with a computing device.
- Display 254 may also include a touch sensitive screen arranged to receive input from an object such as a stylus or a digit from a human hand.
- Optional GPS transceiver 264 can determine the physical coordinates of Client device 200 on the surface of the Earth, which typically outputs a location as latitude and longitude values. GPS transceiver 264 can also employ other geo-positioning mechanisms, including, but not limited to, triangulation, assisted GPS (AGPS), E-OTD, CI, SAI, ETA, BSS or the like, to further determine the physical location of Client device 200 on the surface of the Earth. It is understood that under different conditions, GPS transceiver 264 can determine a physical location within millimeters for Client device 200 ; and in other cases, the determined physical location may be less precise, such as within a meter or significantly greater distances. In one embodiment, however, Client device may through other components, provide other information that may be employed to determine a physical location of the device, including for example, a MAC address, IP address, or the like.
- Mass memory 230 includes a RAM 232 , a ROM 234 , and other storage means. Mass memory 230 illustrates another example of computer storage media for storage of information such as computer readable instructions, data structures, program modules or other data. Mass memory 230 stores a basic input/output system (“BIOS”) 240 for controlling low-level operation of Client device 200 . The mass memory also stores an operating system 241 for controlling the operation of Client device 200 . It will be appreciated that this component may include a general purpose operating system such as a version of UNIX, or LINUXTM, or a specialized client communication operating system such as Windows ClientTM, or the Symbian® operating system. The operating system may include, or interface with a Java virtual machine module that enables control of hardware components and/or operating system operations via Java application programs.
- BIOS basic input/output system
- Memory 230 further includes one or more data stores, which can be utilized by Client device 200 to store, among other things, applications 242 and/or other data.
- data stores may be employed to store information that describes various capabilities of Client device 200 . The information may then be provided to another device based on any of a variety of events, including being sent as part of a header during a communication, sent upon request, or the like. At least a portion of the capability information may also be stored on a disk drive or other storage medium (not shown) within Client device 300 .
- Applications 242 may include computer executable instructions which, when executed by Client device 200 , transmit, receive, and/or otherwise process audio, video, images, and enable telecommunication with another user of another client device.
- Other examples of application programs include calendars, browsers, contact managers, task managers, transcoders, database programs, word processing programs, security applications, spreadsheet programs, games, search programs, and so forth.
- Applications 242 may further include messaging client 245 that is configured to send, to receive, and/or to otherwise process messages using email, SMS, MMS, IM, VOIP, and/or any of a variety of other messaging communication protocols.
- a single messaging client 245 is illustrated it should be clear that multiple messaging clients may be employed.
- one messaging client may be configured to manage email messages, where another messaging client manages SMS messages, and yet another messaging client is configured to manage serving advertisements, IMs, or the like.
- the messages 302 can be provided to the message engine 308 or accessed by a computer program or device that can access the messages.
- the messages 302 can be stored in a database of stored messages 306 , which is associated with an email provider, such as Yahoo! Mail®.
- the database 306 can be any type of data storage, database, memory or file storage that can store the messages 302 and associated message template information, as discussed above.
- email messages as a whole are discussed within some embodiments; however, it should not be construed to limit the applications of the systems and methods discussed herein. Indeed, while reference is made throughout the instant disclosure to email messages, other forms of electronic documents or transmissions (e.g., Short Message Service (SMS) messages, Multi-media Message Service (MMS) messages, and the like) can be communicated and/or accessed and processed by the message engine 308 according to the systems and methods discussed herein.
- SMS Short Message Service
- MMS Multi-media Message Service
- the network 304 can be any type of network such as, but not limited to, a wireless network, a local area network (LAN), wide area network (WAN), the Internet, or a combination thereof.
- the network 304 facilitates connectivity between the messages 302 , the message engine 308 , and the database of stored resources 306 .
- the message engine 308 includes a time-to-live (TTL) module 310 , a determination module 312 , delivery module 314 and a destruction module 316 .
- TTL time-to-live
- determination module 312 determination module 312
- delivery module 314 delivery module 314
- destruction module 316 destruction module
- FIG. 4 is a process 400 diagram illustrating steps performed in accordance with embodiments of the present disclosure for delivering messages according to Short-Lived (SL) protocol. That is, the present disclosure involves automatically deleting a delivered message upon the occurrence or satisfaction of a trigger such as a predetermined passage of time or occurrence of an expiration date associated with the delivered message. As discussed herein, the automatic deletion of the delivered message not only occurs from within the recipient's inbox, but also from the recipient's device and from the server communicating the message, so as to effectuate a permanent deletion or deletion that is unrecoverable by a sender and/or a recipient.
- a trigger such as a predetermined passage of time or occurrence of an expiration date associated with the delivered message.
- the automatic deletion of the delivered message not only occurs from within the recipient's inbox, but also from the recipient's device and from the server communicating the message, so as to effectuate a permanent deletion or deletion that is unrecoverable by a sender and/or a recipient.
- user Bob drafts a message to user Jane.
- Bob includes his social security number (SS #) because Jane has requested it. Since this is important information to Bob and protecting his SS # is vital to protecting his identity, Bob would like to have this message expire immediately after Jane needs this information. For example, prior to sending the message, Bob sets an expiration date on the email for 24 hours. Therefore, the message will expire after 24 hours from Bob actually sending the message.
- SS # social security number
- the message will be deleted regardless of whether Jane actually opens the message.
- the delivery time criteria can be preset in accordance with Jane actually opening the message, as opposed to the transmittal of the message (from Bob). For example, Bob can set the message to be deleted 5 days after Jane actually opens the message. Therefore, if Jane opens the message 2 days after receiving the message in her inbox, the message will self-destruct 5 days after she opens it (7 days after being sent).
- Bob In another example between Bob and Jane, Bob is drafting a message on Jan. 1, 2015 relating to an event on the morning of January 3 rd and thus would like his message to self-destruct on Jan. 3, 2015 at 10:00 AM, since after that the email would be irrelevant. Bob can set this time criteria or trigger prior to sending the message; therefore, at 10:00 AM on Jan. 3, 2015, the message will automatically self-destruct and be deleted from Jane's inbox.
- company X sends user Jim a message containing a coupon for Black Friday sales at their store. This is a time sensitive promotion and company X also would like to ensure that the number of coupons being used does not exceed a certain amount. Therefore, company X sets the expiration date on the message to 9:00 am on Friday, Nov. 28, 2014, whereby the message will self-destruct at that time. Additionally, company X benefits from sending this type of message, because, as discussed herein, time-restricted messages cannot be forwarded or duplicated in any manner. Therefore, even prior to the message's expiration, Jim cannot forward the received coupon to his friends for use, which enables company X to control which people receive their promotions.
- the disclosed systems and methods provides functionality for messages to be removed or become unrecoverable, which to a user is perceived as self-erasure after a stipulated amount of time.
- the content of the messages being delivered according to the disclosed protocol will be permanently discarded when the message self-destructs as denoted by TTL restrictions within the TTL flag embedded in the messages, and such messages can thus be prohibited from being forwarded or copied in any way. This allows sharing of sensitive or temporarily relevant information without the fear of such information being forwarded, saved or downloaded.
- the sender can also have the message deleted from their sent mailbox, such that sensitive emails are destroyed at both the sending and receiving location(s).
- the recipient is able to respond to the message (i.e., reply), but only prior to the message self-destructing. However, if the recipient does reply, a copy of the sent message is not saved in the recipient's sent folder, nor is the original content from the original message sent in the reply.
- the reply message will follow the TTL restrictions associated with the original message from which the reply was based. In some embodiments, the reply message may be subject to additional or alternative TTL restrictions, in a similar manner discussed herein.
- the message, message data and all associated content is hard deleted, which renders them unrecoverable. Indeed, the details of the sender, such as the sender's messaging address and identity, are also discarded when the sender's message self-destructs. That is, the SL protocol discussed herein can be set to not allow the option of saving the sender's email address in the receiver's address book nor does it support a feature of auto-saving unknown email addresses that are provided by some messaging providers.
- process 400 begins at Step 402 with a user drafting a message.
- the drafted message can be a new message, a forwarded message or a reply message; however, it should be understood that any newly drafted forward message may not be based off of an original message subject to the TTL restrictions, as such forwarded drafts would be subject to those TTL restrictions and are prohibited from being sent, as discussed above.
- Step 404 the TTL restrictions are set or applied to the newly drafted message, and as a result the message is treated as a SL message.
- the TTL restrictions are set as a TTL flag associated with the drafted message, as discussed above. Setting and associating the TTL restrictions is performed by the TTL module 310 .
- the TTL restrictions enable a sender of the message to exert control the drafted message upon transmittal in order to limit the number and type of operations that may be performed on such messages.
- the TTL restrictions comprise information dictating the lifespan of the message. That is, the TTL restrictions govern the message's time for destruction.
- entry or association of the TTL restrictions to the drafted message can be resultant of a user prompt. That is, during drafting of the message, completion of the message or upon receiving a send command from the sending user, the sending user may be provided with a prompt requesting whether the message is to be subject to TTL restrictions. This prompt can enable the user to enter the TTL restrictions associated with the message, as discussed herein.
- the TTL restrictions can be applied to the message by way of a command entry typed directly in the message.
- a TTL command can be based on a user's text or character entry in connection an identified syntax or operator that signifies a TTL restriction is being entered.
- a TTL command can take the form of any known or to be known syntax or operators.
- a TTL command can be detected by text or characters being entered within a set of brackets—for example: [Jan. 1, 2015], which signifies that the message is to expire on Jan. 1, 2015.
- a TTL command can also be denoted by the use of a colon operator or hashtag.
- Step 408 when the determination of Step 408 results in the recipient being identified as not being SL compliant, instead of Steps 418 - 420 occurring, embodiments may exist where the SL message may be rejected and denied from being sent. In such embodiments, this ensures that SL messages are sent only when there is a guarantee of their destruction on the client side.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Display name | The name of the template |
displayed in the user interface. | |
Code name | The name of the template used in code. |
E-mail type | Identifies the type of functionality to which the |
template is related. This can be used to categorize | |
and filter e-mail templates. | |
From | E-mail address that will be used as the |
sender (From) address of the e-mail. | |
To | Email address that will be used as the |
recipient address of the email. | |
Cc | E-mail addresses of copy recipients. |
Bcc | E-mail addresses of blind copy recipients. These |
will get a copy of the e-mail, but won't see | |
the addresses of other recipients in the mail. | |
Subject | Subject of the e-mail. |
HTML version | Defines the content that is used for the template |
when sending e-mails in HTML format. | |
The preferred format can be | |
selected by the user as part of system | |
set-up or preference indication, for | |
example, by using the Site Manager −> | |
Settings −> System −> E-mails −> | |
E-mail format setting. | |
Plain text version | Plain text version of the e-mail template. |
Claims (22)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/456,257 US12355714B2 (en) | 2014-12-08 | 2023-08-25 | System and method for self-destructing messages |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/563,922 US11108719B2 (en) | 2014-12-08 | 2014-12-08 | System and method for self-destructing messages |
US17/459,677 US11489800B2 (en) | 2014-12-08 | 2021-08-27 | System and method for self-destructing messages |
US18/050,700 US11855941B2 (en) | 2014-12-08 | 2022-10-28 | System and method for self-destructing messages |
US18/456,257 US12355714B2 (en) | 2014-12-08 | 2023-08-25 | System and method for self-destructing messages |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/050,700 Continuation US11855941B2 (en) | 2014-12-08 | 2022-10-28 | System and method for self-destructing messages |
Publications (2)
Publication Number | Publication Date |
---|---|
US20230412545A1 US20230412545A1 (en) | 2023-12-21 |
US12355714B2 true US12355714B2 (en) | 2025-07-08 |
Family
ID=56095345
Family Applications (4)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/563,922 Active 2035-07-19 US11108719B2 (en) | 2014-12-08 | 2014-12-08 | System and method for self-destructing messages |
US17/459,677 Active US11489800B2 (en) | 2014-12-08 | 2021-08-27 | System and method for self-destructing messages |
US18/050,700 Active 2035-02-06 US11855941B2 (en) | 2014-12-08 | 2022-10-28 | System and method for self-destructing messages |
US18/456,257 Active US12355714B2 (en) | 2014-12-08 | 2023-08-25 | System and method for self-destructing messages |
Family Applications Before (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/563,922 Active 2035-07-19 US11108719B2 (en) | 2014-12-08 | 2014-12-08 | System and method for self-destructing messages |
US17/459,677 Active US11489800B2 (en) | 2014-12-08 | 2021-08-27 | System and method for self-destructing messages |
US18/050,700 Active 2035-02-06 US11855941B2 (en) | 2014-12-08 | 2022-10-28 | System and method for self-destructing messages |
Country Status (1)
Country | Link |
---|---|
US (4) | US11108719B2 (en) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10291566B2 (en) | 2014-12-31 | 2019-05-14 | Albert S. Penilla | Data transmission management for computer based inter-user communication |
US10142274B2 (en) * | 2014-12-31 | 2018-11-27 | Jason M. Penilla | Message communication systems and applications with message lifetime settings for automatic message deletion |
KR20240141865A (en) * | 2015-05-06 | 2024-09-27 | 스냅 인코포레이티드 | Systems and methods for ephemeral group chat |
US10834073B2 (en) * | 2015-05-21 | 2020-11-10 | Prakash Nayak | Secure and confidential sharing of digital content |
US9906479B1 (en) * | 2015-06-16 | 2018-02-27 | Snap Inc. | Storage management for ephemeral messages |
US10616162B1 (en) | 2015-08-24 | 2020-04-07 | Snap Inc. | Systems devices and methods for automatically selecting an ephemeral message availability |
US10630742B2 (en) * | 2015-10-23 | 2020-04-21 | Kodiak Networks, Inc. | System and method for content messaging |
US9906480B2 (en) * | 2015-12-10 | 2018-02-27 | Facebook, Inc. | Techniques for ephemeral messaging with legacy clients |
US10200330B2 (en) * | 2015-12-10 | 2019-02-05 | Facebook, Inc. | Techniques for ephemeral messaging with a message queue |
US9753722B2 (en) * | 2015-12-14 | 2017-09-05 | International Business Machines Corporation | Automatically expiring out source code comments |
US10469985B2 (en) * | 2017-08-04 | 2019-11-05 | Tariq Tony Ghanma | System and use method for broadcasting specific data content to specific users based on message lifetime |
US11349659B2 (en) * | 2017-08-29 | 2022-05-31 | Amazon Technologies, Inc. | Transmitting an encrypted communication to a user in a second secure communication network |
US10791196B2 (en) | 2017-08-29 | 2020-09-29 | Wickr Inc. | Directory lookup for federated messaging with a user from a different secure communication network |
US11095662B2 (en) | 2017-08-29 | 2021-08-17 | Amazon Technologies, Inc. | Federated messaging |
US11368442B2 (en) * | 2017-08-29 | 2022-06-21 | Amazon Technologies, Inc. | Receiving an encrypted communication from a user in a second secure communication network |
US11126738B2 (en) | 2018-03-27 | 2021-09-21 | BoardPAC Private Limited | Methods, systems and machine-readable programs for communicating self destructive messages |
US11005803B1 (en) * | 2019-03-29 | 2021-05-11 | Snap Inc. | Messaging system with post-reply state after viewing message from feed |
US11316806B1 (en) * | 2020-01-28 | 2022-04-26 | Snap Inc. | Bulk message deletion |
US11899905B2 (en) * | 2020-06-30 | 2024-02-13 | Snap Inc. | Selectable items providing post-viewing context actions |
US11683415B2 (en) * | 2021-04-13 | 2023-06-20 | First Orion Corp. | Providing enhanced call content to a mobile device |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7328251B2 (en) | 1999-09-20 | 2008-02-05 | Microsoft Corporation | Thread based email |
US7966492B1 (en) | 2002-05-10 | 2011-06-21 | Emc Corporation | System and method for allowing an e-mail message recipient to authenticate the message |
EP2362592A1 (en) | 2010-02-26 | 2011-08-31 | Research In Motion Limited | Automatic deletion of electronic messages |
US20110213845A1 (en) * | 2010-02-26 | 2011-09-01 | Research In Motion Limited | Automatic deletion of electronic messages |
US8626844B2 (en) | 2007-03-26 | 2014-01-07 | The Trustees Of Columbia University In The City Of New York | Methods and media for exchanging data between nodes of disconnected networks |
US8719238B2 (en) | 2009-01-22 | 2014-05-06 | Sunstein Kann Murphy & Timbers LLP | Office-based notification messaging system |
US20140379495A1 (en) | 2013-06-21 | 2014-12-25 | Clear Channel Management Services, Inc. | E-Mail Based Dynamic Advertising |
US8930474B2 (en) * | 2012-02-20 | 2015-01-06 | Microsoft Corporation | Time-managed electronic mail messages |
US20150281156A1 (en) * | 2014-03-27 | 2015-10-01 | Dropbox, Inc. | Dynamic filter generation for message management systems |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1360596A (en) * | 1999-02-12 | 2002-07-24 | 遗传研究所有限公司 | Humanized immunoglobulin reacting with B7 molecule and therapeutic method using same |
US8824664B1 (en) * | 2013-06-13 | 2014-09-02 | Genesys Telecommunications Laboratories, Inc. | System and method for controlling lifespan of interaction requests |
-
2014
- 2014-12-08 US US14/563,922 patent/US11108719B2/en active Active
-
2021
- 2021-08-27 US US17/459,677 patent/US11489800B2/en active Active
-
2022
- 2022-10-28 US US18/050,700 patent/US11855941B2/en active Active
-
2023
- 2023-08-25 US US18/456,257 patent/US12355714B2/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7328251B2 (en) | 1999-09-20 | 2008-02-05 | Microsoft Corporation | Thread based email |
US7966492B1 (en) | 2002-05-10 | 2011-06-21 | Emc Corporation | System and method for allowing an e-mail message recipient to authenticate the message |
US8626844B2 (en) | 2007-03-26 | 2014-01-07 | The Trustees Of Columbia University In The City Of New York | Methods and media for exchanging data between nodes of disconnected networks |
US8719238B2 (en) | 2009-01-22 | 2014-05-06 | Sunstein Kann Murphy & Timbers LLP | Office-based notification messaging system |
EP2362592A1 (en) | 2010-02-26 | 2011-08-31 | Research In Motion Limited | Automatic deletion of electronic messages |
US20110213845A1 (en) * | 2010-02-26 | 2011-09-01 | Research In Motion Limited | Automatic deletion of electronic messages |
US8930474B2 (en) * | 2012-02-20 | 2015-01-06 | Microsoft Corporation | Time-managed electronic mail messages |
US20140379495A1 (en) | 2013-06-21 | 2014-12-25 | Clear Channel Management Services, Inc. | E-Mail Based Dynamic Advertising |
US20150281156A1 (en) * | 2014-03-27 | 2015-10-01 | Dropbox, Inc. | Dynamic filter generation for message management systems |
Also Published As
Publication number | Publication date |
---|---|
US20210392101A1 (en) | 2021-12-16 |
US11108719B2 (en) | 2021-08-31 |
US20160164816A1 (en) | 2016-06-09 |
US20230412545A1 (en) | 2023-12-21 |
US11855941B2 (en) | 2023-12-26 |
US11489800B2 (en) | 2022-11-01 |
US20230070278A1 (en) | 2023-03-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12355714B2 (en) | System and method for self-destructing messages | |
US11606326B2 (en) | System and method for generating new message templates | |
US11438294B2 (en) | System and method for auto-formatting messages based on learned message templates | |
US10567325B2 (en) | System and method for email message following from a user's inbox | |
US10873553B2 (en) | System and method for triaging in a message system on send flow | |
US9390396B2 (en) | Bootstrapping social networks using augmented peer to peer distributions of social networking services | |
US10785344B2 (en) | Computerized system and method for automatically communicating conditional messages within a mobile application environment | |
US20170091717A1 (en) | Auto extraction of tasks from unstructured communications such as emails and messages | |
CN110034998B (en) | Computer system and method for controlling electronic messages and their responses after delivery | |
US20150033141A1 (en) | System and method for providing an interactive message inbox | |
US9413698B2 (en) | System and method for email pre-delivery | |
US11044222B2 (en) | Automated connection of electronic messaging and social networking services method and apparatus | |
US20150052203A1 (en) | System and method for mailing list identification and representation | |
TWI496485B (en) | Method for instant communication, terminal and system | |
US10560408B2 (en) | Computerized system and method for selectively communicating HTML content to a user's inbox as a native message | |
US10791084B2 (en) | Automatic electronic message content rating method and apparatus | |
US9953073B2 (en) | System and method for editing dynamically aggregated data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: YAHOO ASSETS LLC, NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAHOO AD TECH LLC (FORMERLY VERIZON MEDIA INC.);REEL/FRAME:065364/0895 Effective date: 20211117 Owner name: VERIZON MEDIA INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OATH INC.;REEL/FRAME:065364/0608 Effective date: 20201005 Owner name: OATH INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAHOO HOLDINGS, INC.;REEL/FRAME:065414/0493 Effective date: 20180124 Owner name: YAHOO! INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BHAGWAN, VARUN;KANUGOVI, GOWRI;BONFORTE, JEFFREY;AND OTHERS;REEL/FRAME:065355/0940 Effective date: 20141201 Owner name: YAHOO HOLDINGS, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YAHOO! INC.;REEL/FRAME:065364/0253 Effective date: 20170613 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |